Debian DSA-4065-1 : openssl1.0 - security update

Medium Nessus Plugin ID 105329


The remote Debian host is missing a security-related update.


Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit. The Common Vulnerabilities and Exposures project identifies the following issues :

- CVE-2017-3737 David Benjamin of Google reported that OpenSSL does not properly handle SSL_read() and SSL_write() while being invoked in an error state, causing data to be passed without being decrypted or encrypted directly from the SSL/TLS record layer.

- CVE-2017-3738 It was discovered that OpenSSL contains an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli.

Details can be found in the upstream advisory:


Upgrade the openssl1.0 packages.

For the stable distribution (stretch), these problems have been fixed in version 1.0.2l-2+deb9u2.

See Also

Plugin Details

Severity: Medium

ID: 105329

File Name: debian_DSA-4065.nasl

Version: 3.9

Type: local

Agent: unix

Published: 2017/12/18

Updated: 2018/11/13

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS v3.0

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openssl1.0, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 2017/12/17

Reference Information

CVE: CVE-2017-3737, CVE-2017-3738

DSA: 4065